Salve a tutti, sto smanettando ankio sul problema della PEC.
Per ora tutto quello che son riuscito a fare e far scaricare la pec al mail server in pop3s in modo tale che diversi utenti la possano condividere, salvare , backup etc etc.
Per l'invio invece bisogna delegare il client per via dei certificati.
Mi sono fatto una piccola guida tratta da questo link, solo che ha qualche dettaglio in più.
http://kotnik.gnulinuxcentar.org/wp-content/uploads/2006/11/googlesertifikati.zipPer ora sono riuscito a scaricare con Gmail pops.sicurezzapostale.it (consulentidellavoropec.it) ma sto sbattendo la testa con Aruba non riesco a recuperate i root certificates.
Se qualcuno ha info, grazie ciao
NOTE:
Scaricare mail in pop3s con certificato da Consuletidellavoropec.it
Andare sotto la ~home dell'utente
$ mkdir ~/.certs
$ cd ~/.certs
Ricaviamoci ora i certificati con il comando
# openssl s_client -connect pops.sicurezzapostale.it:995 -showcerts
Avremo una videata come segue:
CONNECTED(00000003)
depth=1 /C=US/O=Equifax/OU=Equifax Secure Certificate Authority
verify error:num=19:self signed certificate in certificate chain
verify return:0
---
Certificate chain
0 s:/serialNumber=bk5Gt81ZsmjXB1IBdb92xxGzxWBwvZBL/C=IT/ST=Ancona/L=Senigallia/O=Namirial S.p.A./CN=pops.sicurezzapostale.it
i:/C=US/O=Equifax/OU=Equifax Secure Certificate Authority
-----BEGIN CERTIFICATE-----
MIIDlTCCAv6gAwIBAgIDD4JWMA0GCSqGSIb3DQEBBQUAME4xCzAJBgNVBAYTAlVT
MRAwDgYDVQQKEwdFcXVpZmF4MS0wKwYDVQQLEyRFcXVpZmF4IFNlY3VyZSBDZXJ0
aWZpY2F0ZSBBdXRob3JpdHkwHhcNMTAwMjIzMTgwMzUzWhcNMTEwMjI1MDcxMjAz
WjCBmzEpMCcGA1UEBRMgYms1R3Q4MVpzbWpYQjFJQmRiOTJ4eEd6eFdCd3ZaQkwx
CzAJBgNVBAYTAklUMQ8wDQYDVQQIEwZBbmNvbmExEzARBgNVBAcTClNlbmlnYWxs
aWExGDAWBgNVBAoTD05hbWlyaWFsIFMucC5BLjEhMB8GA1UEAxMYcG9wcy5zaWN1
cmV6emFwb3N0YWxlLml0MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
xmbSl3TDKlFrz7Dy+4vap1dhVuEmadQNJ1CXSpRQvLRffDKJewlPGfgLzktdUF48
/4TDdeafuoxz9OgeOSMI0rCE8csDTPI5eHiP2Of7ywAvSbOvEYT6sMm30mHfeGFy
L6KO6Yqvp0MSOdsV98vrQo+8oduzEeXwaFPvK0l/TnnK5NgCW3cD2aSOCSam/mfV
+BP2GnR/gPxlNO4/aH2KzPyX4kO8sxskhVBd2uMc5ny7B+atwBV5r+v84tlcR7Zl
f0VKPQGwi/6LqxCKvuDOt66wbAUF/LUmzKIQT80XbNXyPsZFVXPmR0O9psSQLDYD
JnqvFFbC1QTT844GvSKCrwIDAQABo4GuMIGrMA4GA1UdDwEB/wQEAwIE8DAdBgNV
HQ4EFgQUL2s76/ALnUDgYStna+S/ZyF2I3AwOgYDVR0fBDMwMTAvoC2gK4YpaHR0
cDovL2NybC5nZW90cnVzdC5jb20vY3Jscy9zZWN1cmVjYS5jcmwwHwYDVR0jBBgw
FoAUSOZo+SvSspXXR9gjIBBPM5iQn9QwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsG
AQUFBwMCMA0GCSqGSIb3DQEBBQUAA4GBADGLxneUnEitPniCvsBR6wiCGc14wEUt
4BKDFxWSHmltOFMO/08xbCTgSOq+5vQySqt2hnZRDdJhwaEJm/85f3XfTBiTwVUs
+0PmznXwR/JRZUKueV1CgYkTxNwvjhzsNqbmHniKfZo1QYufGqktLC7wgVWuLiPr
t7J/1R+CizLE
-----END CERTIFICATE-----
1 s:/C=US/O=Equifax/OU=Equifax Secure Certificate Authority
i:/C=US/O=Equifax/OU=Equifax Secure Certificate Authority
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
---
Server certificate
subject=/serialNumber=bk5Gt81ZsmjXB1IBdb92xxGzxWBwvZBL/C=IT/ST=Ancona/L=Senigallia/O=Namirial S.p.A./CN=pops.sicurezzapostale.it
issuer=/C=US/O=Equifax/OU=Equifax Secure Certificate Authority
---
No client certificate CA names sent
---
SSL handshake has read 1890 bytes and written 468 bytes
---
New, TLSv1/SSLv3, Cipher is AES256-SHA
Server public key is 2048 bit
SSL-Session:
Protocol : TLSv1
Cipher : AES256-SHA
Session-ID: D894E3946627F5F527BB4D8924A2F19E05A115038475B73FB9E2453A4D5F7A7C
Session-ID-ctx:
Master-Key: 9B9DE58B650AF53E2307209DE109D4E8CEC0A05B6957D7860C84FAEC2D95FF64E6BE057924DE1A7C65F20685BA68893A
Key-Arg : None
Krb5 Principal: None
Start Time: 1273060405
Timeout : 300 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
---
+OK Hello there.
digitare quit per uscire
Vedremo due certificati che iniziano per -----BEGIN CERTIFICATE----- e finiscono con -----END CERTIFICATE-----
Copiate il primo in un file chiamato a caso consulentidellavoropec.pem
# vi consulentidellavoropec.pem
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
copiate il secondo in equifax.pem
# vi equifax.pem
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Una volta salvati i certificati in ./certs creiamo l'hash:
$ c_rehash ~/.certs
NB: Su nethservice7.3 manca il comando c_rehash, se manca scaricare e scompattare qui
http://www.openssl.org/source/openssl-0.9.8n.tar.gz$ su - root
password:
# cp openssl-0.9.8n/tools/c_rehash /usr/bin/
# chmod 755 /usr/bin/c_rehash
Per saperne di più man
http://man.he.net/man1/c_rehashControlliamo il tutto con
$ openssl s_client -connect pops.sicurezzapostale.it:995 -CApath ~/.certs/
...
...
...
Key-Arg : None
Krb5 Principal: None
Start Time: 1273062206
Timeout : 300 (sec)
Verify return code: 0 (ok)
---
+OK Hello there.
Se termina con Verify return code: 0 (ok) vuol dire che è andato tutto bene ( quit x uscire )
Infine configuriamo fetchmail creando il suo file di configurazione, che risiede nella home.
$ vi .fetchmailrc
poll pops.sicurezzapostale.it with proto POP3
user 'pippo_pluto@consulentidellavoropec.it' there with pass 'Tua_Password' is
'tuo_utente@tuo_dominio.xx' here options keep ssl sslcertck sslcertpath '/home/e-smith/files/users/tuo_utente/.certs/'
$ chmod 600 ~/.fetchmailrc
provare a scaricare eseguendo il fetchmail
$ fetchmail
3 messages (3 seen) for tuo_utente@consulentidellavoropec.it at pops.sicurezzapostale.it (430872 octets).
skipping message tuo_utente@consulentidellavoropec.it@pops.sicurezzapostale.it:1 not flushed
skipping message tuo_utente@consulentidellavoropec.it@pops.sicurezzapostale.it:2 not flushed
skipping message tuo_utente@consulentidellavoropec.it@pops.sicurezzapostale.it:3 not flushed
Ora creare un file cron che lanci il fetchmail ogni 15 minuti
$ crontab -e
0-59/15 * * * * /usr/bin/fetchmail -s
Per GMAIL
Creare la seguente dir
$ mkdir ~/.certs
$ cd ~/.certs
Creare i certificati vuoti
$ touch gmail.pem
$ touch equifax.pem
Scaricabili anche da qui quelli per Gmail
o copio questi
Editare gmail.pem e copiarvi dentro il seguente certificato
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Editare equifax.pem e copiarvi dentro il seguente certificato
Equifax Secure CA
=================
MD5 Fingerprint: 67:CB:9D:C0:13:24:8A:82:9B:B2:17:1E:D1:1B:EC:D4
PEM Data:
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Oppure ricavatelo con questo output
$ openssl s_client -connect pop.gmail.com:995 -showcerts
Su nethservice manca il comando c_reshash , se manca scaricare e scompattare qui
http://www.openssl.org/source/openssl-0.9.8n.tar.gzMan
http://man.he.net/man1/c_rehashCopiarlo in /usr/bin/c_rehash
Lancio il seguente comando che linka i certificati
$ c_rehash ~/.certs
Controlliamo il tutto con
$ openssl s_client -connect pop.gmail.com:995 -CApath ~/.certs/
Se termina con Verify return code: 0 (ok) vuol dire che è andato tutto bene
Infine configuriamo fetchmail creando il suo file di configurazione, che risiede nella home.
$ vi $HOME/.fetchmailrc
poll pop.gmail.com with proto POP3
user 'tua_mail@gmail.com' there with pass 'xxxxxx' is
'berna@xxxtica.net' here options keep ssl sslcertck sslcertpath '/root/.certs'
$ chmod 600 ~/.fetchmailrc
P.Bernabei